Performing OSINT Gathering on Employee Targets
Open Source Intelligence (OSINT) gathering applies to not only companies but to employees as well. This course will teach you how to gather various forms of employee OSINT, including historical, social, mobile, and physical information.
What you'll learn
As organizations focus their efforts on protecting their technical infrastructure, far too many leave their most vulnerable assets exposed to attack: their people. In this course, Performing OSINT Gathering on Employee Targets, you will gain the ability to gather and analyze OSINT related to an organization’s workforce members. First, you will learn useful tools and techniques for collecting employee OSINT. Next, you will analyze your data, extracting information that might hold value to an attacker. Finally, you will explore how to incorporate your findings into preparing social engineering attacks. When you’re finished with this course, you will have the skills and knowledge of employee OSINT gathering needed to conduct an effective, worthwhile penetration test, and to help the target organization better understand how to protect their employees.
Table of contents
- Preparing to Perform Employee OSINT 1m
- What Is OSINT? 2m
- Why Is OSINT Important? 4m
- OSINT Analysis 2m
- How Effective Is OSINT Gathering? 1m
- The Penetration Testing Execution Standard (PTES) 3m
- Three Forms of OSINT 4m
- What Does OSINT Entail? 4m
- Preparing Your Testing Environment 4m
- Virtual Machine Players 4m
- Summary 1m